CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    6.5

    CVSS31
    CVE-2023-42916 - Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability -

    Action Due Dec 25, 2023 Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

    Action : Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-42916

    Alert Date: Dec 04, 2023 | 589 days ago

    10.0

    CVSS31
    CVE-2023-49103 - ownCloud graphapi Information Disclosure Vulnerability -

    Action Due Dec 21, 2023 Target Vendor : ownCloud

    Description : ownCloud graphapi contains an information disclosure vulnerability that can reveal sensitive data stored in phpinfo() via GetPhpInfo.php, including administrative credentials.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-49103

    Alert Date: Nov 30, 2023 | 593 days ago

    9.6

    CVSS31
    CVE-2023-6345 - Google Skia Integer Overflow Vulnerability -

    Action Due Dec 21, 2023 Target Vendor : Google

    Description : Google Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a malicious file. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-6345

    Alert Date: Nov 30, 2023 | 593 days ago

    7.8

    CVSS31
    CVE-2023-4911 - GNU C Library Buffer Overflow Vulnerability -

    Action Due Dec 12, 2023 Target Vendor : GNU

    Description : GNU C Library's dynamic loader ld.so contains a buffer overflow vulnerability when processing the GLIBC_TUNABLES environment variable, allowing a local attacker to execute code with elevated privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1056e5b4c3f2d90ed2b4a55f96add28da2f4c8fa, https://access.redhat.com/security/cve/cve-2023-4911, https://www.debian.org/security/2023/dsa-5514 ; https://nvd.nist.gov/vuln/detail/CVE-2023-4911

    Alert Date: Nov 21, 2023 | 602 days ago

    5.4

    CVSS31
    CVE-2023-36584 - Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability -

    Action Due Dec 07, 2023 Target Vendor : Microsoft

    Description : Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36584 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36584

    Alert Date: Nov 16, 2023 | 607 days ago

    9.8

    CVSS31
    CVE-2023-1671 - Sophos Web Appliance Command Injection Vulnerability -

    Action Due Dec 07, 2023 Target Vendor : Sophos

    Description : Sophos Web Appliance contains a command injection vulnerability in the warn-proceed handler that allows for remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce; https://nvd.nist.gov/vuln/detail/CVE-2023-1671

    Alert Date: Nov 16, 2023 | 607 days ago

    9.8

    CVSS31
    CVE-2020-2551 - Oracle Fusion Middleware Unspecified Vulnerability -

    Action Due Dec 07, 2023 Target Vendor : Oracle

    Description : Oracle Fusion Middleware contains an unspecified vulnerability in the WLS Core Components that allows an unauthenticated attacker with network access via IIOP to compromise the WebLogic Server.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.oracle.com/security-alerts/cpujan2020.html; https://nvd.nist.gov/vuln/detail/CVE-2020-2551

    Alert Date: Nov 16, 2023 | 607 days ago

    7.8

    CVSS31
    CVE-2023-36033 - Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability -

    Action Due Dec 05, 2023 Target Vendor : Microsoft

    Description : Microsoft Windows Desktop Window Manager (DWM) Core Library contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36033

    Alert Date: Nov 14, 2023 | 609 days ago

    8.8

    CVSS31
    CVE-2023-36025 - Microsoft Windows SmartScreen Security Feature Bypass Vulnerability -

    Action Due Dec 05, 2023 Target Vendor : Microsoft

    Description : Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36025; https://nvd.nist.gov/vuln/detail/CVE-2023-36025

    Alert Date: Nov 14, 2023 | 609 days ago

    7.8

    CVSS31
    CVE-2023-36036 - Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability -

    Action Due Dec 05, 2023 Target Vendor : Microsoft

    Description : Microsoft Windows Cloud Files Mini Filter Driver contains a privilege escalation vulnerability that could allow an attacker to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36036 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36036

    Alert Date: Nov 14, 2023 | 609 days ago

    9.8

    CVSS31
    CVE-2023-47246 - SysAid Server Path Traversal Vulnerability -

    Action Due Dec 04, 2023 Target Vendor : SysAid

    Description : SysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification; https://nvd.nist.gov/vuln/detail/CVE-2023-47246

    Alert Date: Nov 13, 2023 | 610 days ago

    5.3

    CVSS31
    CVE-2023-36844 - Juniper Junos OS EX Series PHP External Variable Modification Vulnerability -

    Action Due Nov 17, 2023 Target Vendor : Juniper

    Description : Juniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables, leading to partial loss of integrity, which may allow chaining to other vulnerabilities.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36844

    Alert Date: Nov 13, 2023 | 610 days ago

    9.8

    CVSS31
    CVE-2023-36845 - Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability -

    Action Due Nov 17, 2023 Target Vendor : Juniper

    Description : Juniper Junos OS on EX Series and SRX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control an important environment variable. Using a crafted request, which sets the variable PHPRC, an attacker is able to modify the PHP execution environment allowing the injection und execution of code.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36845

    Alert Date: Nov 13, 2023 | 610 days ago

    5.3

    CVSS31
    CVE-2023-36847 - Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability -

    Action Due Nov 17, 2023 Target Vendor : Juniper

    Description : Juniper Junos OS on EX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-36847

    Alert Date: Nov 13, 2023 | 610 days ago

    5.3

    CVSS31
    CVE-2023-36846 - Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability -

    Action Due Nov 17, 2023 Target Vendor : Juniper

    Description : Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36846

    Alert Date: Nov 13, 2023 | 610 days ago

    5.3

    CVSS31
    CVE-2023-36851 - Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability -

    Action Due Nov 17, 2023 Target Vendor : Juniper

    Description : Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36851

    Alert Date: Nov 13, 2023 | 610 days ago

    7.5

    CVSS31
    CVE-2023-29552 - Service Location Protocol (SLP) Denial-of-Service Vulnerability -

    Action Due Nov 29, 2023 Target Vendor : IETF

    Description : The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.

    Action : Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems running on untrusted networks, including those directly connected to the Internet.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on the patching status. For more information please see https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp and https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks.; https://nvd.nist.gov/vuln/detail/CVE-2023-29552

    Alert Date: Nov 08, 2023 | 615 days ago

    9.8

    CVSS31
    CVE-2023-22518 - Atlassian Confluence Data Center and Server Improper Authorization Vulnerability -

    Action Due Nov 28, 2023 Target Vendor : Atlassian

    Description : Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22518

    Alert Date: Nov 07, 2023 | 616 days ago

    10.0

    CVSS31
    CVE-2023-46604 - Apache ActiveMQ Deserialization of Untrusted Data Vulnerability -

    Action Due Nov 23, 2023 Target Vendor : Apache

    Description : Apache ActiveMQ contains a deserialization of untrusted data vulnerability that may allow a remote attacker with network access to a broker to run shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt; https://nvd.nist.gov/vuln/detail/CVE-2023-46604

    Alert Date: Nov 02, 2023 | 621 days ago

    8.8

    CVSS31
    CVE-2023-46748 - F5 BIG-IP Configuration Utility SQL Injection Vulnerability -

    Action Due Nov 21, 2023 Target Vendor : F5

    Description : F5 BIG-IP Configuration utility contains an SQL injection vulnerability that may allow an authenticated attacker with network access through the BIG-IP management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46747.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://my.f5.com/manage/s/article/K000137365 ; https://nvd.nist.gov/vuln/detail/CVE-2023-46748

    Alert Date: Oct 31, 2023 | 623 days ago
Showing 20 of 1383 Results

Filters

© cvefeed.io
Latest DB Update: Jul. 15, 2025 3:29